Spaces:
Running
Running
# 🛡️ AntiScam AI Pro - Configuración Nginx | |
# Proxy reverso con SSL y optimizaciones | |
user nginx; | |
worker_processes auto; | |
error_log /var/log/nginx/error.log warn; | |
pid /var/run/nginx.pid; | |
events { | |
worker_connections 1024; | |
use epoll; | |
multi_accept on; | |
} | |
http { | |
# Configuraciones básicas | |
include /etc/nginx/mime.types; | |
default_type application/octet-stream; | |
# Logging | |
log_format main '$remote_addr - $remote_user [$time_local] "$request" ' | |
'$status $body_bytes_sent "$http_referer" ' | |
'"$http_user_agent" "$http_x_forwarded_for"'; | |
access_log /var/log/nginx/access.log main; | |
# Optimizaciones de rendimiento | |
sendfile on; | |
tcp_nopush on; | |
tcp_nodelay on; | |
keepalive_timeout 65; | |
types_hash_max_size 2048; | |
client_max_body_size 50M; | |
# Gzip compression | |
gzip on; | |
gzip_vary on; | |
gzip_min_length 1024; | |
gzip_proxied any; | |
gzip_comp_level 6; | |
gzip_types | |
text/plain | |
text/css | |
text/xml | |
text/javascript | |
application/json | |
application/javascript | |
application/xml+rss | |
application/atom+xml | |
image/svg+xml; | |
# Rate limiting | |
limit_req_zone $binary_remote_addr zone=api:10m rate=10r/s; | |
limit_req_zone $binary_remote_addr zone=login:10m rate=5r/m; | |
# Security headers | |
add_header X-Frame-Options SAMEORIGIN always; | |
add_header X-Content-Type-Options nosniff always; | |
add_header X-XSS-Protection "1; mode=block" always; | |
add_header Referrer-Policy "strict-origin-when-cross-origin" always; | |
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self'; connect-src 'self';" always; | |
# Upstream para AntiScam AI | |
upstream antiscam_backend { | |
server antiscam-ai:7860 max_fails=3 fail_timeout=30s; | |
keepalive 32; | |
} | |
# Redirección HTTP a HTTPS | |
server { | |
listen 80; | |
server_name tu-dominio.com www.tu-dominio.com; | |
# Certificados Let's Encrypt (ACME challenge) | |
location /.well-known/acme-challenge/ { | |
root /var/www/certbot; | |
} | |
# Redireccionar todo a HTTPS | |
location / { | |
return 301 https://$server_name$request_uri; | |
} | |
} | |
# Servidor HTTPS principal | |
server { | |
listen 443 ssl http2; | |
server_name tu-dominio.com www.tu-dominio.com; | |
# Certificados SSL | |
ssl_certificate /etc/nginx/ssl/cert.pem; | |
ssl_certificate_key /etc/nginx/ssl/key.pem; | |
# Configuración SSL moderna | |
ssl_protocols TLSv1.2 TLSv1.3; | |
ssl_ciphers ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384; | |
ssl_prefer_server_ciphers off; | |
ssl_session_cache shared:SSL:10m; | |
ssl_session_timeout 10m; | |
# HSTS | |
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; | |
# Archivos estáticos con caché | |
location ~* \.(js|css|png|jpg|jpeg|gif|ico|svg|woff|woff2|ttf|eot)$ { | |
expires 1y; | |
add_header Cache-Control "public, immutable"; | |
try_files $uri @backend; | |
} | |
# Rate limiting para rutas sensibles | |
location ~ ^/(login|register|api) { | |
limit_req zone=login burst=10 nodelay; | |
proxy_pass http://antiscam_backend; | |
proxy_set_header Host $host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto $scheme; | |
} | |
# WebSocket support para Gradio | |
location /queue/join { | |
proxy_pass http://antiscam_backend; | |
proxy_http_version 1.1; | |
proxy_set_header Upgrade $http_upgrade; | |
proxy_set_header Connection "upgrade"; | |
proxy_set_header Host $host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto $scheme; | |
proxy_read_timeout 86400; | |
} | |
# Ruta principal de la aplicación | |
location / { | |
limit_req zone=api burst=20 nodelay; | |
# Proxy headers | |
proxy_pass http://antiscam_backend; | |
proxy_set_header Host $host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto $scheme; | |
# Timeouts | |
proxy_connect_timeout 60s; | |
proxy_send_timeout 60s; | |
proxy_read_timeout 60s; | |
# Buffering | |
proxy_buffering on; | |
proxy_buffer_size 4k; | |
proxy_buffers 8 4k; | |
proxy_busy_buffers_size 8k; | |
} | |
# Ruta para webhooks de Stripe | |
location /webhook/stripe { | |
limit_req zone=api burst=5 nodelay; | |
proxy_pass http://antiscam_backend/webhook/stripe; | |
proxy_set_header Host $host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto $scheme; | |
} | |
# Página de mantenimiento | |
location @maintenance { | |
root /usr/share/nginx/html; | |
try_files /maintenance.html =503; | |
} | |
# Error pages personalizadas | |
error_page 404 /404.html; | |
error_page 500 502 503 504 /50x.html; | |
location = /50x.html { | |
root /usr/share/nginx/html; | |
} | |
} | |
# Servidor de monitoreo (opcional) | |
server { | |
listen 8080; | |
server_name localhost; | |
# Status de Nginx | |
location /nginx_status { | |
stub_status on; | |
access_log off; | |
allow 127.0.0.1; | |
allow 172.16.0.0/12; # Docker networks | |
deny all; | |
} | |
# Health check | |
location /health { | |
access_log off; | |
return 200 "healthy\n"; | |
add_header Content-Type text/plain; | |
} | |
} | |
} |